87 research outputs found
Contextual biometric watermarking of fingerprint images
This research presents contextual digital watermarking techniques using face and demographic text data as multiple watermarks for protecting the evidentiary integrity of fingerprint image. The proposed techniques embed the watermarks into selected regions of fingerprint image in MDCT and DWT domains. A general image watermarking algorithm is developed to investigate the application of MDCT in the elimination of blocking artifacts. The application of MDCT has improved the performance of the watermarking technique compared to DCT. Experimental results show that modifications to fingerprint image are visually imperceptible and maintain the minutiae detail. The integrity of the fingerprint image is verified through high matching score obtained from the AFIS system. There is also a high degree of correlation between the embedded and extracted watermarks. The degree of similarity is computed using pixel-based metrics and human visual system metrics. It is useful for personal identification and establishing digital chain of custody. The results also show that the proposed watermarking technique is resilient to common image modifications that occur during electronic fingerprint transmission
Content-Aware Quantization Index Modulation:Leveraging Data Statistics for Enhanced Image Watermarking
Image watermarking techniques have continuously evolved to address new
challenges and incorporate advanced features. The advent of data-driven
approaches has enabled the processing and analysis of large volumes of data,
extracting valuable insights and patterns. In this paper, we propose two
content-aware quantization index modulation (QIM) algorithms: Content-Aware QIM
(CA-QIM) and Content-Aware Minimum Distortion QIM (CAMD-QIM). These algorithms
aim to improve the embedding distortion of QIM-based watermarking schemes by
considering the statistics of the cover signal vectors and messages. CA-QIM
introduces a canonical labeling approach, where the closest coset to each cover
vector is determined during the embedding process. An adjacency matrix is
constructed to capture the relationships between the cover vectors and
messages. CAMD-QIM extends the concept of minimum distortion (MD) principle to
content-aware QIM. Instead of quantizing the carriers to lattice points,
CAMD-QIM quantizes them to close points in the correct decoding region.
Canonical labeling is also employed in CAMD-QIM to enhance its performance.
Simulation results demonstrate the effectiveness of CA-QIM and CAMD-QIM in
reducing embedding distortion compared to traditional QIM. The combination of
canonical labeling and the minimum distortion principle proves to be powerful,
minimizing the need for changes to most cover vectors/carriers. These
content-aware QIM algorithms provide improved performance and robustness for
watermarking applications.Comment: 12 pages, 10 figure
Spread spectrum-based video watermarking algorithms for copyright protection
Merged with duplicate record 10026.1/2263 on 14.03.2017 by CS (TIS)Digital technologies know an unprecedented expansion in the last years. The consumer can
now benefit from hardware and software which was considered state-of-the-art several years
ago. The advantages offered by the digital technologies are major but the same digital
technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly
possible and relatively easy, in spite of various forms of protection, but due to the analogue
environment, the subsequent copies had an inherent loss in quality. This was a natural way of
limiting the multiple copying of a video material. With digital technology, this barrier
disappears, being possible to make as many copies as desired, without any loss in quality
whatsoever. Digital watermarking is one of the best available tools for fighting this threat.
The aim of the present work was to develop a digital watermarking system compliant with the
recommendations drawn by the EBU, for video broadcast monitoring. Since the watermark
can be inserted in either spatial domain or transform domain, this aspect was investigated and
led to the conclusion that wavelet transform is one of the best solutions available. Since
watermarking is not an easy task, especially considering the robustness under various attacks
several techniques were employed in order to increase the capacity/robustness of the system:
spread-spectrum and modulation techniques to cast the watermark, powerful error correction
to protect the mark, human visual models to insert a robust mark and to ensure its invisibility.
The combination of these methods led to a major improvement, but yet the system wasn't
robust to several important geometrical attacks. In order to achieve this last milestone, the
system uses two distinct watermarks: a spatial domain reference watermark and the main
watermark embedded in the wavelet domain. By using this reference watermark and techniques
specific to image registration, the system is able to determine the parameters of the attack and
revert it. Once the attack was reverted, the main watermark is recovered. The final result is a
high capacity, blind DWr-based video watermarking system, robust to a wide range of attacks.BBC Research & Developmen
Integration and optimization of collusion secure fingerprinting in image watermarking
Estágio realizado na Fraunhofer SIT - e orientado pelo Dr. Huajian Liu e pelo Dr. Marcel SchäferTese de mestrado integrado. Engenharia Electrotécnica e de Computadores. Faculdade de Engenharia. Universidade do Porto. 201
Robust watermarking and its applications to communication problems
Digital watermarking has recently gained an intense interest in research
and applications. An invisible and secret signal, called watermark,
is added to the host data. With the help of this watermark
issuer of the data can be unveiled, unauthorised users can be identified,
illicit copying can be avoided, any attempt to temper with the data can
be detected and many other security services can be provided. In this
thesis, the relations and differences between watermarking and communication
systems are elaborated. Based on these results new methods
for both watermarking and communication are derived.
A new blind, robust and reversible watermarking scheme based on
Code Division Multiple Access (CDMA) is presented in this thesis. Using
this scheme watermark is arithmetically added to spatial domain or
frequency domain. Watermark is extracted by using spreading codes
only. Proposed watermarking scheme is simple, computationally efficient
and can be applied to any image format.
A novel idea that watermark can be part of the image is presented. By
using watermark, which is a part of an image, digital watermarking can
be used beyond simple security tasks. A part of an image is selected
and embedded in the whole image as watermark. This watermarked
image is attacked (transmitted or compressed). By using the extracted
watermark and attacked selected part image quality can be assessed or
jpeg quantization ratio can be estimated or even image can be equalized
blindly.
Furthermore, CDMA based watermarking is used to authenticate radio
frequency signal. Spreaded watermark is added in the form of noise
to the modulated radio frequency signal. If this noise is increased,
watermarked signal automatically becomes a scrambled signal. Later
watermark is extracted and by using reversibility of proposed scheme
watermark is removed. Once the watermarked is removed original signal
is restored, hence descrambled
Towards Automatically Penalizing Multimedia Breaches
This work studies the problem of automatically penalizing intentional or unintentional data breach (APB) by a receiver/custodian receiving confidential data from a sender. We solve this problem for multimedia data by augmenting a blockchain on-chain smart contract between the sender and receiver with an off-chain cryptographic protocol, such that any significant data breach from the receiver is penalized through a monetary loss. Towards achieving the goal, we develop a natural extension of oblivious transfer called doubly oblivious transfer (DOT) which, when combined with robust watermarking and a claim-or-refund blockchain contract provides the necessary framework to realize the APB protocol in a provably secure manner. In our APB protocol, a public data breach by the receiver leads to her Bitcoin (or other blockchain) private signing key getting revealed to the sender, which allows him to penalize the receiver by claiming the deposit from the claim- or-refund contract. Interestingly, the protocol also ensures that the malicious sender cannot steal the deposit, even as he knows the original multimedia document or releases it in any form. We implement our APB protocol, develop the required smart contract for Bitcoin and observe our system to be efficient and easy to deploy in practice for multimedia documents. We analyze our DOT-based design against partial adversarial leakages and observe it to be robust against even small leakages
- …